SlideShare une entreprise Scribd logo
1  sur  43
Listen only mode
Watch again
View slides
Submit via panelQ&A

www.MykonosSoftware.com
Al Huizenga
Director of Product Management
Mykonos Software
Kyle Adams
Chief Architect
Mykonos Software
Three Goals
THINK DIFFERENTLY
About Web Security
Today, your Web applications
are a black hole
The Future of Web Security is
smart self-defensive applications.
It’s time to
understand and respond
to your web attackers
Free Accounts
Created
Used as Spam
Engine
What is Web application Abuse?
Shopping Cart
Manipulation
1
2
3
4
5
6
Social Engineering
Confidence Scams
Points Systems
Defacement
of Site
Transfer
of Funds
Data Theft
Definition
Manipulating your site (and its trust)
in an attempt to commit fraud,
vandalize your brand,
and compromise your users’ privacy.
What does Web Application
Abuse look like?
SALE
SALESocial
Network XXX
SALESocial
Network XXXPharmacy
Hacked
Why does Web Application
Abuse happen?
of all security threats are now
at the web application layer
Source: Gartner
of security spending is at the web
application layer
Source: State of Web Application Security by Ponemon Institute April 2010
Network
Perimeter
Network Firewall
Database Firewall
Servers
Databases
NIPS HIPS IDS
PORT
80
HR Benefits
Core Business
ApplicationCRM E-commerceMarketing
   
of developer headcount
is focused on security
Source: OWASP Security Spending Benchmarks Project March 2009
vulnerabilities per web application
Source: Web Application Security Council (WASC)
What are the common
characteristics of a Web attack?
Automated
and/or
Distributed
Based on
Application
behavior
Hard to filter
out
How does it happen….?
Day 1
Attack begins
Day X
Attack discovered
OVER TIME
Phase 1
Silent
Introspection
Phase 2
Attack Vector
Establishment
Phase 3
Attack
Implementation
Phase 4
Attack
Automation
Phase 5
Maintenance
Five Phases of Web App Abuse
Phase 1
Silent Introspection
Footprint: Low
Method: Run a debugger, surf the site,
collect data, analyze offline
Info Sought: What Web server? Database?
Network hardware and software?
Programming languages and libraries?
Phase 2
Attack Vector Establishment
Footprint: Higher
Techniques:
1. Cloak yourself
2. For all dynamic URLs, test inputs for
errors or blind injection to find vulnerabilities
3. For each vulnerability, start structuring your
input to shape the error into an attack
Phase 3
Implementation
Footprint: Highest
Attack Defined: Now that you know the
vector(s), what can you do with them?
• Extract/edit/delete DB records or tables?
• Infect site with a worm that distributes
malware?
• Launch a complex phishing scam?
Phase 4
Automation
Footprint: Low
Attack Successful: If the attack makes money,
you want to do it discretely again and again
• Write an attack program script
• Buy a pre-fab “Command and Control” kit and
raise your own BotNet to attack from
Phase 5
Maintenance
Footprint: Low
Attack Successful: Let the money roll in, go do
something else
Successful automated abuse can exist
undetected in maintenance mode for years
If a patch disrupts the abuse, oh well. Either
refine the vector again, or go hunting
elsewhere
Vulnerability Management
Web Application
Firewall
Phase 1
Silent
Introspection
Phase 2
Attack Vector
Establishment
Phase 3
Attack
Implementation
Phase 4
Attack
Automation
Phase 5
Maintenance
What can you do?
Mykonos Security Appliance
Web Application Intrusion Detection & Prevention
The Mykonos Security Appliance.

Identify and track
attempts to introspect
your sites/apps
1 Gain intelligence about
behavior & threat level
of bad actors
2 Instantly neutralize
threats
3
A New Innovative Approach
App
Server
Client
Code Honey-pots
Network
Perimeter
Database Firewall
Traps
Triggers
www.MykonosSoftware.com
Download Whitepaper
Understanding and Responding to the
Five Phases of Web Application Abuse
www.MykonosSoftware.com

Contenu connexe

Tendances

Seminar on Internet security
Seminar on Internet securitySeminar on Internet security
Seminar on Internet securityRahul Sah
 
Report on Rogue Security Software
Report on Rogue Security SoftwareReport on Rogue Security Software
Report on Rogue Security SoftwareSymantec Italia
 
Ict Assignment
Ict AssignmentIct Assignment
Ict Assignmentainmz
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasuresNoushin Ahson
 
Become a Penetration Tester
Become a Penetration TesterBecome a Penetration Tester
Become a Penetration TesterSagarMajzumdar
 
Battling Malware In The Enterprise
Battling Malware In The EnterpriseBattling Malware In The Enterprise
Battling Malware In The EnterpriseAyed Al Qartah
 
Patches Arrren't Just for Pirates
Patches Arrren't Just for PiratesPatches Arrren't Just for Pirates
Patches Arrren't Just for Pirateswebnowires
 
Mobile security and drozer tool demo
Mobile security and drozer tool demoMobile security and drozer tool demo
Mobile security and drozer tool demoGowthamraj Palani
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and SpywaresAnkit Mistry
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1rubal_9
 
Phases Of The Intrusion Kill-Chain
Phases Of The Intrusion Kill-ChainPhases Of The Intrusion Kill-Chain
Phases Of The Intrusion Kill-ChainTRAPMINE
 

Tendances (20)

Seminar on Internet security
Seminar on Internet securitySeminar on Internet security
Seminar on Internet security
 
Report on Rogue Security Software
Report on Rogue Security SoftwareReport on Rogue Security Software
Report on Rogue Security Software
 
Zero day exploit
Zero day exploitZero day exploit
Zero day exploit
 
Ict Assignment
Ict AssignmentIct Assignment
Ict Assignment
 
Bug Bounty
Bug BountyBug Bounty
Bug Bounty
 
Computer VIRUS
Computer VIRUSComputer VIRUS
Computer VIRUS
 
Bug bounty
Bug bountyBug bounty
Bug bounty
 
Common malware and countermeasures
Common malware and countermeasuresCommon malware and countermeasures
Common malware and countermeasures
 
Become a Penetration Tester
Become a Penetration TesterBecome a Penetration Tester
Become a Penetration Tester
 
Spyware
SpywareSpyware
Spyware
 
Battling Malware In The Enterprise
Battling Malware In The EnterpriseBattling Malware In The Enterprise
Battling Malware In The Enterprise
 
Patches Arrren't Just for Pirates
Patches Arrren't Just for PiratesPatches Arrren't Just for Pirates
Patches Arrren't Just for Pirates
 
Mobile security and drozer tool demo
Mobile security and drozer tool demoMobile security and drozer tool demo
Mobile security and drozer tool demo
 
Computer virus 2015
Computer virus 2015Computer virus 2015
Computer virus 2015
 
Keyloggers and Spywares
Keyloggers and SpywaresKeyloggers and Spywares
Keyloggers and Spywares
 
Spyware Adware1
Spyware Adware1Spyware Adware1
Spyware Adware1
 
Spyware Adware
Spyware AdwareSpyware Adware
Spyware Adware
 
Petya ransomware cyber security awareness
Petya ransomware  cyber security awarenessPetya ransomware  cyber security awareness
Petya ransomware cyber security awareness
 
Adware
AdwareAdware
Adware
 
Phases Of The Intrusion Kill-Chain
Phases Of The Intrusion Kill-ChainPhases Of The Intrusion Kill-Chain
Phases Of The Intrusion Kill-Chain
 

Similaire à How websites are attacked

DEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptDEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptschwarz10
 
Scaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware InfectionScaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware InfectionWayne Huang
 
TRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , TexasTRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , TexasAditya K Sood
 
Bank One App Sec Training
Bank One App Sec TrainingBank One App Sec Training
Bank One App Sec TrainingMike Spaulding
 
13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...
13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...
13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...Aditya K Sood
 
MIT-6-determina-vps.ppt
MIT-6-determina-vps.pptMIT-6-determina-vps.ppt
MIT-6-determina-vps.pptwebhostingguy
 
Secure by design and secure software development
Secure by design and secure software developmentSecure by design and secure software development
Secure by design and secure software developmentBill Ross
 
Mod2 wfbs new starter
Mod2 wfbs new starterMod2 wfbs new starter
Mod2 wfbs new starterIan Thiele
 
Domain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application HackingDomain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application HackingShivamSharma909
 
Addressing the Top 3 Real-world Security Challenges for Your IBM i Systems
Addressing the Top 3 Real-world Security Challenges for Your IBM i SystemsAddressing the Top 3 Real-world Security Challenges for Your IBM i Systems
Addressing the Top 3 Real-world Security Challenges for Your IBM i SystemsPrecisely
 
Mitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 AitpMitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 AitpJoann Davis
 
Defending Your IBM i Against Malware
Defending Your IBM i Against MalwareDefending Your IBM i Against Malware
Defending Your IBM i Against MalwarePrecisely
 
Web Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging ThreatsWeb Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging ThreatsAlan Kan
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanismCAS
 
Threats, Threat Modeling and Analysis
Threats, Threat Modeling and AnalysisThreats, Threat Modeling and Analysis
Threats, Threat Modeling and AnalysisIan G
 
2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOKBoris Loukanov
 
ransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptxransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptxdawitTerefe5
 

Similaire à How websites are attacked (20)

DEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.pptDEVSECOPS_the_beginning.ppt
DEVSECOPS_the_beginning.ppt
 
Scaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware InfectionScaling Web 2.0 Malware Infection
Scaling Web 2.0 Malware Infection
 
TRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , TexasTRISC 2010 - Grapevine , Texas
TRISC 2010 - Grapevine , Texas
 
Bank One App Sec Training
Bank One App Sec TrainingBank One App Sec Training
Bank One App Sec Training
 
13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...
13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...
13th Symposium of Association of Anti Virus Asia Researchers (AAVAR 2010) con...
 
MIT-6-determina-vps.ppt
MIT-6-determina-vps.pptMIT-6-determina-vps.ppt
MIT-6-determina-vps.ppt
 
Secure by design and secure software development
Secure by design and secure software developmentSecure by design and secure software development
Secure by design and secure software development
 
Novinky F5
Novinky F5Novinky F5
Novinky F5
 
Mod2 wfbs new starter
Mod2 wfbs new starterMod2 wfbs new starter
Mod2 wfbs new starter
 
Globally.docx
Globally.docxGlobally.docx
Globally.docx
 
CEH Domain 5.pdf
CEH Domain 5.pdfCEH Domain 5.pdf
CEH Domain 5.pdf
 
Domain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application HackingDomain 5 of the CEH: Web Application Hacking
Domain 5 of the CEH: Web Application Hacking
 
Addressing the Top 3 Real-world Security Challenges for Your IBM i Systems
Addressing the Top 3 Real-world Security Challenges for Your IBM i SystemsAddressing the Top 3 Real-world Security Challenges for Your IBM i Systems
Addressing the Top 3 Real-world Security Challenges for Your IBM i Systems
 
Mitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 AitpMitigating Malware Presentation Jkd 11 10 08 Aitp
Mitigating Malware Presentation Jkd 11 10 08 Aitp
 
Defending Your IBM i Against Malware
Defending Your IBM i Against MalwareDefending Your IBM i Against Malware
Defending Your IBM i Against Malware
 
Web Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging ThreatsWeb Application Testing for Today’s Biggest and Emerging Threats
Web Application Testing for Today’s Biggest and Emerging Threats
 
Internet threats and defence mechanism
Internet threats and defence mechanismInternet threats and defence mechanism
Internet threats and defence mechanism
 
Threats, Threat Modeling and Analysis
Threats, Threat Modeling and AnalysisThreats, Threat Modeling and Analysis
Threats, Threat Modeling and Analysis
 
2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK2016 CYBERSECURITY PLAYBOOK
2016 CYBERSECURITY PLAYBOOK
 
ransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptxransomware keylogger rootkit.pptx
ransomware keylogger rootkit.pptx
 

Dernier

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhisoniya singh
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersThousandEyes
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxMalak Abu Hammad
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 

Dernier (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | DelhiFULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
FULL ENJOY 🔝 8264348440 🔝 Call Girls in Diplomatic Enclave | Delhi
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for PartnersEnhancing Worker Digital Experience: A Hands-on Workshop for Partners
Enhancing Worker Digital Experience: A Hands-on Workshop for Partners
 
The Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptxThe Codex of Business Writing Software for Real-World Solutions 2.pptx
The Codex of Business Writing Software for Real-World Solutions 2.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 

How websites are attacked

Notes de l'éditeur

  1. Welcome to this Webinar brought to you by Mykonos Software. Today’s presentation titled “How Web Applications are Attacked” looks at “Understanding and Responding to the Five Phases of Web Application Abuse”. My name is Edward Roberts and I’ll be the moderator for this event. For those of you who are new to Mykonos Software, we are helping companies understand how Web applications are abused by criminal attackers to steal data, commit fraud or even use company bandwidth for un-intended tasks. The Mykonos Security Appliance detects malicious abuse of web applications before the damage is done. This software solution profiles the abuse through intelligence gathering and responds to any abuse in real-time ultimately preventing data theft, fraudulent behavior and misuse of your Web properties.
  2. You are in listen only mode. We encourage you to ask questions. We will have time to answer them at the conclusion of the presentation. Please use the panel to submit your questions You can view the slides and watch the webinar again on our website with the next 2-3 days.
  3. Al Huizenga Director of Product Management Al has 11 years experience managing, releasing, and marketing Web-based products and technologies in companies such as Cognos Inc., Platform Computing, and Panorama Software. Kyle Adams Chief Architect: Has final responsibility for code quality and technical excellence. He is a graduate of the Rochester Institute of Technology, earning a Degree in Computer Science with a minor in Criminal Justice. He wrote his first password protection software at age 10, started hacking incessantly, and was writting his own encryption software by age 14. An AJAX expert and enthusiast, Kyle has worked on scores of web application projects.
  4. Today’s presentation has three goals
  5. I want you to think differently about security. I will offer a unique way to think about security by understanding the behavior of an attacker rather than concentrating on packets of data.
  6. Secondly I today you will see how hackers attack a website with real-life techniques that will frighten you in their simplicity.
  7. And thirdly we want you to help remove Grandma’s frustration because the web is frightening enough to her without having to overcome abuse that she can’t even understand.
  8. You do not have any visibility into the traffic? Do you know what is normal use? Do you know what is abusive use? Do you know who is introspecting your site? Isn’t it time to understand the behavior of all users on your site rather than just monitoring data packets?
  9. For too long applications are passive waiting for a malicious user to attack. The future Web security is creating smart self-defensive applications.
  10. It’s time to understand and respond to your web attackers. But in order to do those two things first you must be able to identify them before they attack your web application.
  11. What is our background with Web application abuse? Mykonos Software was incubated within Bluetie. One of the first online email and collaboration SaaS providers since 1999. With over 2million users, Bluetie sees its fair share of malicious users. What kind of abuse occurred?
  12. Bluetie would see abuse where fake accounts are created. The Web application would be used as a spam engine. Attackers would change the web application code and write a script against it to use the resources of Bluetie rather than go for stealing data. It’s a nuisance and wastes company bandwidth and resources and slows down the product to real legitimate users.
  13. What is Web application Abuse? On the right here we have the ultimate fear which is data theft of credit cards, financial data, SS#’s. But web application abuse can be many different things. Shopping cart manipulation – If you can change the number of items in a cart and not pay for it, it can be very lucrative, and to the company it looks like normal use. Social engineering confidence scams – the recent twitter attack. Points sytems – If you can change the points used you can improve scores in games, change airmiles, change student grades. Defacement of Site – More of an embarrassment and a nuisance but getting the site defaced creates problems for real users who worry about the safety of going to your site. Transfer of funds from one account to another – anytime money is accessible on-line there is the opportunity for some abuse. Data Theft – Credit cards, SS#, personal data, financial data, healthcare data.
  14. What does Web application abuse look like? As we just stated it can take many forms. Let’s take you through some examples….
  15. Grandma has been saving up for a flat screen TV. She sees that an online electronics store is going to have a great sale on a particular model on Black Friday. She waits until the minute the sale starts, and goes online to make the purchase. Sadly, younger, more tech savvy shoppers have figured out how to reserve all of the flat screen TVs in inventory by automating the application shopping cart. Grandma is out of luck – even though she jumped in right away to make the purchase, it looks like the store is out of TVs, and she feels ripped off.
  16. Grandma decides to go online and see Christmas pictures from her family around the US. When she gets into the site, she sees a message from her daughter, and clicks it. Oddly, instead of showing family pictures, the message automatically redirects her to a pornography site. Grandma is shocked, upset, and vows never to go to that social networking site again. Also, she doesn’t know it, but that porn site downloaded a virus to her laptop. Grandma has been compromised.
  17. The shock took it’s toll on Grandma’s heart, and she goes to her pharmacy’s Web site to get her heart medication prescription refilled. She has an account on the site that contains her Medicare information, including social security number, address, and her CC information too. What she doesn’t know is that the pharmacy Web site has been compromised, and criminals regularly and discretely pull all of that PII from the database, and sell it on the black market. Grandma is a prime candidate for identity theft.
  18. Why does Web application abuse happen? It’s a factor of where security is today.
  19. The impact of the web application revolution is that 70% of all threats are now at the web layer According to Gartner
  20. The focus has been on the network. 93 % of security spending is at the network layer.
  21. The network has been well secured and the techniques used were effective. Then came web apps and we blew open port 80. We put applications on the web and many companies put the entire business on the web. And this is open to 2 billion users with a browser to use or abuse.
  22. In almost half of companies (41%), less than 2% of developer headcount is focused on security.
  23. What does that mean to you? WASC states that the average web application has 12 vulnerabilities. Multiply that by how many web applications your organization has and you’ll see how many options an abusive user has.
  24. What are the common characteristics of a Web attack? Based on a deep understanding of application behavior Hard to filter out effectively over time Often automated or distributed
  25. Not a one-time incident (it just gets reported that way) The actual attack vector that works needs to be established first The abuse needs to be tested and automated It has it’s own dev lifecycle
  26. Examples: Twitter
  27. Vulnerability management and filtering help…but have their limits Code scanning pre or post compile is hard because who is going to go back and patch all the vulnerabilities that are found. Many are in third party apps, Most companies are not going to re-write all their internal apps. It’s hard to pre-guess all possible vulnerabilities and vectors It’s hard to filter intelligently and dynamically enough New solutions are attempting to hook into the application context, use it to understand abusive behavior, and respond adaptively
  28. The Mykonos Security Appliance works during the first two phases of the attack. It does three things to help you catch an attacker before the damage is done. 1 Identify and track attempts to introspect your sites/apps. 2. Gain intelligence about behavior & threat level of bad actors 3. Instantly neutralize threats.
  29. We have an innovative approach. We work as a reverse proxy. We insert detection points into the code as it is delivered to the browser. If an abusive user plays with one of the detection points we deliver a token onto the hackers machine so that we can re-identify them if they return.
  30. And maybe we wouldn’t annoy our grandma’s if we all went a little more pro-active on our defense of Web application abuse.